First published: Thu Oct 03 2019(Updated: )
Last updated 24 July 2024
Credit: CVE-2017-16808 CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 CVE-2018-16300 CVE-2018-16301 CVE-2018-16451 CVE-2018-16452 CVE-2019-15166 CVE-2019-15167 cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tcpdump Tcpdump | <4.9.3 | |
Apple macOS Catalina | <10.15.2 | 10.15.2 |
Apple Mojave | ||
Apple High Sierra | ||
debian/tcpdump | 4.99.0-2+deb11u1 4.99.3-1 4.99.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2018-16452.
The title of the vulnerability is 'The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.'
The impacted software is tcpdump.
You can fix this vulnerability by updating to tcpdump version 4.9.3 or later.
You can find more information about this vulnerability at the following references: [GitHub Commit](https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778), [GitHub Changes](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES), [Debian LTS Announce](https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html).